Difference between revisions of "AFSecurity Seminar"

From mn/ifi/AFSecurity
Jump to: navigation, search
 
(199 intermediate revisions by the same user not shown)
Line 1: Line 1:
== Intelligence Analysis ==
+
== ''Confidential Computing'' ==
  
'''DATE:'''  16 June 2017
+
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
+
|-
'''LOCATION:'''  Kristen Nygaards sal (room 5370), Ole Johan Dahl's House.
+
| '''TIME:'''&nbsp; Friday 1 December 2023, 14:00h<br />'''PLACE:'''&nbsp; Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. [https://kart.finn.no/?lng=10.71782&lat=59.94342&zoom=17&mapType=normap&markers=10.71782,59.94342,r,Gaustadall%C3%A9en+23B See map].<br />
 
+
All interested are welcome. Coffee and snaks served.<br />
'''AGENDA:'''
+
<br />'''AGENDA:'''<br />
 
+
14:00h Welcome to AFSecurity at UiO <br />
13:00h Welcome at IFI
+
14:15h Invited talk<br />
 
+
* TITLE: ''Confidential Computing'' &nbsp;
13:15h Talk: ''Intelligence Analysis: Reflections on the Human – Machine Analytic Enterprise from a Behavioral Computer Science Perspective.''
+
* SPEAKER: Ijlal Loutfi, Canonical 
 +
| <center>[[File:photo-Ijlal-Loutfi.png|90px|link=https://www.linkedin.com/in/ijlal-loutfi-785125234/]]</center>
 +
| <center>[[File:logo-Canonical.png|320px|link=https://canonical.com/]]</center>
 +
|}
 +
* ABSTRACT:<br />Protecting data in-use has long been a challenging open problem in computer science. While being computed on in cleartext in system memory, your data stored in RAM is exposed to the millions lines of code that make up the underlying platform’s privileged system software. By design, a malicious firmware, or compromised operating system can easily leak your data, or compromise its integrity.<br /><br />Confidential computing is a privacy-enhancing system security primitive which addresses this challenge head-on, by running your security-sensitive processes in isolated execution environments whose security guarantees can be remotely attested. Its recent generations, such as Intel SGX, Intel TDX and AMD SEV SNP, make use of newer CPU hardware and architectural extensions, such as the AES-128 hardware encryption engine which encrypts RAM memory pages in real-time. Hardware with these capabilities is already available in the market, and public cloud providers have been one of its early adopters.<br /><br />In this presentation, we first visit the history of confidential computing, then study the technical system primitives which allow us to implement both isolation and attestation. We also explore the different silicon implementations of confidential computing, where they are deployed today, and for which uses cases.
  
14:00h Discussion
+
<br />15:00h Discussion<br />
  
 +
'''BIO:''' &nbsp; Dr. Ijlal Loutfi is the product lead for Ubuntu Security at Canonical. She has a PhD in cyber security from the University of Oslo, where she worked on Trusted Execution Environments and Identity Management.
  
'''SPEAKER:''' Tore Pedersen (Norwegian Defence Intelligence School)
+
 
 +
<br /><br />
  
'''ABSTRACT:'''
+
{| border="0" cellpadding="1" cellspacing="1" width="90%"
Making judgments automatically, without conscious awareness, also termed ‘heuristic processing’, is particularly adaptive and appropriate in situations where people have extensive previous (tacit) knowledge and experience. However, people tend to employ the same heuristic processing mode also in situations where they have less previous experience. In such situations heuristic processing is likely to lead to a biased judgment, whereas analytic processing with conscious awareness would more likely lead to an unbiased judgment.
 
This phenomenon may extend also to the machine-based automated knowledge-generation of today and tomorrow: Human biases may unintentionally be imposed on machines through programming of initial algorithms and the biases may sustain in the machines’ automated decision processes. Additionally, machines’ self-adjustment of algorithms in learning processes may, as a result of learning from non-representative data, lead to equally biased output.
 
Moreover, in the process of making inference-leaps from data to knowledge, such as when claiming causal relation between present events or when predicting what the future might look like, validity in analytic products relies on the ability to apply sound scientific reasoning: Knowledge is bounded by the quality and representativeness of collected data, as well as on the limitations of research designs and the assumptions and restrictions inherent in various (statistical) tests. With today’s increased access to data sources and increased data volumes, adherence to the same (traditional) rigorous scientific standards must nevertheless still be applied, both in collection and analysis.
 
Thus, in the human – machine analytic enterprise of today and tomorrow, it is important to be aware of the potential threat from bias, as well as the potential threat from non-adherence to scientific reasoning, because both of these phenomena may have implications for the validity of output from human – machine analytic processes.
 
 
 
'''SPEAKER BIO:'''
 
Tore Pedersen is Associate Professor and Director of Center for Intelligence Studies at the Norwegian Defence Intelligence School (NORDIS). He is also visiting researcher at the Department of Informatics, University of Oslo, and affiliated Associate Professor at the Department of Psychology, Bjørknes University College. He is currently engaged in empirical research on cognitive aspects of the National Intelligence and Security domain.
 
 
 
 
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
 
|-
 
|-
| AFSecurity is organised by the University of Oslo [http://www.mn.uio.no/ifi/english/research/networks/securitylab/ SecurityLab]
+
| [[File:AFSecurity-small.png|250px]]
| [[File:Logo-UiO-SecurityLab-colour.jpg|200px]]
+
| AF''Security'' is organised by UiO [https://www.mn.uio.no/ifi/forskning/grupper/sec/ Digital Security].
 +
| [[File:logo-uio-english-2022.png|250px|link=https://www.mn.uio.no/]]
 +
| [[File:Sec-light-360.png|150px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]
 
|}
 
|}

Latest revision as of 15:30, 14 November 2023

Confidential Computing

TIME:  Friday 1 December 2023, 14:00h
PLACE:  Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. See map.

All interested are welcome. Coffee and snaks served.

AGENDA:
14:00h Welcome to AFSecurity at UiO
14:15h Invited talk

  • TITLE: Confidential Computing  
  • SPEAKER: Ijlal Loutfi, Canonical
Photo-Ijlal-Loutfi.png
Logo-Canonical.png
  • ABSTRACT:
    Protecting data in-use has long been a challenging open problem in computer science. While being computed on in cleartext in system memory, your data stored in RAM is exposed to the millions lines of code that make up the underlying platform’s privileged system software. By design, a malicious firmware, or compromised operating system can easily leak your data, or compromise its integrity.

    Confidential computing is a privacy-enhancing system security primitive which addresses this challenge head-on, by running your security-sensitive processes in isolated execution environments whose security guarantees can be remotely attested. Its recent generations, such as Intel SGX, Intel TDX and AMD SEV SNP, make use of newer CPU hardware and architectural extensions, such as the AES-128 hardware encryption engine which encrypts RAM memory pages in real-time. Hardware with these capabilities is already available in the market, and public cloud providers have been one of its early adopters.

    In this presentation, we first visit the history of confidential computing, then study the technical system primitives which allow us to implement both isolation and attestation. We also explore the different silicon implementations of confidential computing, where they are deployed today, and for which uses cases.


15:00h Discussion

BIO:   Dr. Ijlal Loutfi is the product lead for Ubuntu Security at Canonical. She has a PhD in cyber security from the University of Oslo, where she worked on Trusted Execution Environments and Identity Management.




AFSecurity-small.png AFSecurity is organised by UiO Digital Security. Logo-uio-english-2022.png Sec-light-360.png